2013-01-15 19:53:58 +01:00
|
|
|
// Copyright (C) 2011-2013 Internet Systems Consortium, Inc. ("ISC")
|
2011-11-27 19:35:47 +08:00
|
|
|
//
|
|
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
|
|
// copyright notice and this permission notice appear in all copies.
|
|
|
|
//
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
|
|
|
|
// REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
|
|
|
|
// AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
|
|
// INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
|
|
|
|
// LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
// OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
|
|
// PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
|
2012-11-16 14:15:45 +00:00
|
|
|
#include <asiolink/io_address.h>
|
2011-11-27 19:35:47 +08:00
|
|
|
#include <dhcp/dhcp4.h>
|
2013-07-24 13:41:27 +01:00
|
|
|
#include <dhcp/duid.h>
|
|
|
|
#include <dhcp/hwaddr.h>
|
2011-11-30 15:32:40 +01:00
|
|
|
#include <dhcp/iface_mgr.h>
|
2011-12-20 19:59:14 +01:00
|
|
|
#include <dhcp/option4_addrlst.h>
|
2012-12-31 16:49:37 +01:00
|
|
|
#include <dhcp/option_int.h>
|
2013-01-15 19:53:58 +01:00
|
|
|
#include <dhcp/option_int_array.h>
|
2012-11-16 14:15:45 +00:00
|
|
|
#include <dhcp/pkt4.h>
|
|
|
|
#include <dhcp4/dhcp4_log.h>
|
|
|
|
#include <dhcp4/dhcp4_srv.h>
|
2013-07-24 13:41:27 +01:00
|
|
|
#include <dhcpsrv/addr_utilities.h>
|
|
|
|
#include <dhcpsrv/callout_handle_store.h>
|
2012-12-31 16:49:37 +01:00
|
|
|
#include <dhcpsrv/cfgmgr.h>
|
|
|
|
#include <dhcpsrv/lease_mgr.h>
|
|
|
|
#include <dhcpsrv/lease_mgr_factory.h>
|
|
|
|
#include <dhcpsrv/subnet.h>
|
|
|
|
#include <dhcpsrv/utils.h>
|
2013-07-24 13:41:27 +01:00
|
|
|
#include <dhcpsrv/utils.h>
|
2013-07-15 18:41:19 +02:00
|
|
|
#include <hooks/callout_handle.h>
|
2013-07-24 13:41:27 +01:00
|
|
|
#include <hooks/hooks_manager.h>
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2013-01-14 17:57:26 +01:00
|
|
|
#include <boost/algorithm/string/erase.hpp>
|
|
|
|
|
|
|
|
#include <iomanip>
|
|
|
|
#include <fstream>
|
|
|
|
|
2011-11-27 19:35:47 +08:00
|
|
|
using namespace isc;
|
|
|
|
using namespace isc::asiolink;
|
2012-09-06 11:18:51 +01:00
|
|
|
using namespace isc::dhcp;
|
2013-09-02 17:21:11 +02:00
|
|
|
using namespace isc::dhcp_ddns;
|
2013-07-15 18:41:19 +02:00
|
|
|
using namespace isc::hooks;
|
2012-09-06 11:18:51 +01:00
|
|
|
using namespace isc::log;
|
|
|
|
using namespace std;
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2013-07-15 18:41:19 +02:00
|
|
|
/// Structure that holds registered hook indexes
|
2013-08-19 15:08:08 +02:00
|
|
|
struct Dhcp4Hooks {
|
|
|
|
int hook_index_buffer4_receive_;///< index for "buffer4_receive" hook point
|
2013-07-15 18:41:19 +02:00
|
|
|
int hook_index_pkt4_receive_; ///< index for "pkt4_receive" hook point
|
|
|
|
int hook_index_subnet4_select_; ///< index for "subnet4_select" hook point
|
2013-08-19 15:08:08 +02:00
|
|
|
int hook_index_lease4_release_; ///< index for "lease4_release" hook point
|
2013-07-15 18:41:19 +02:00
|
|
|
int hook_index_pkt4_send_; ///< index for "pkt4_send" hook point
|
2013-08-19 15:08:08 +02:00
|
|
|
int hook_index_buffer4_send_; ///< index for "buffer4_send" hook point
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
/// Constructor that registers hook points for DHCPv4 engine
|
|
|
|
Dhcp4Hooks() {
|
|
|
|
hook_index_buffer4_receive_= HooksManager::registerHook("buffer4_receive");
|
2013-07-15 18:41:19 +02:00
|
|
|
hook_index_pkt4_receive_ = HooksManager::registerHook("pkt4_receive");
|
|
|
|
hook_index_subnet4_select_ = HooksManager::registerHook("subnet4_select");
|
|
|
|
hook_index_pkt4_send_ = HooksManager::registerHook("pkt4_send");
|
2013-08-19 15:08:08 +02:00
|
|
|
hook_index_lease4_release_ = HooksManager::registerHook("lease4_release");
|
|
|
|
hook_index_buffer4_send_ = HooksManager::registerHook("buffer4_send");
|
2013-07-15 18:41:19 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
// Declare a Hooks object. As this is outside any function or method, it
|
|
|
|
// will be instantiated (and the constructor run) when the module is loaded.
|
|
|
|
// As a result, the hook indexes will be defined before any method in this
|
|
|
|
// module is called.
|
2013-08-19 15:08:08 +02:00
|
|
|
Dhcp4Hooks Hooks;
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-01-31 12:16:22 +00:00
|
|
|
namespace isc {
|
|
|
|
namespace dhcp {
|
|
|
|
|
2013-09-02 17:19:53 +02:00
|
|
|
namespace {
|
|
|
|
|
2013-11-19 17:29:40 +01:00
|
|
|
// @todo The following constants describe server's behavior with respect to the
|
2013-09-02 17:19:53 +02:00
|
|
|
// DHCPv4 Client FQDN Option sent by a client. They will be removed
|
|
|
|
// when DDNS parameters for DHCPv4 are implemented with the ticket #3033.
|
|
|
|
|
2013-11-19 17:29:40 +01:00
|
|
|
// @todo Additional configuration parameter which we may consider is the one
|
|
|
|
// that controls whether the DHCP server sends the removal NameChangeRequest
|
|
|
|
// if it discovers that the entry for the particular client exists or that
|
|
|
|
// it always updates the DNS.
|
|
|
|
|
2013-09-02 17:19:53 +02:00
|
|
|
// Should server always include the FQDN option in its response, regardless
|
|
|
|
// if it has been requested in Parameter Request List Option (Disabled).
|
|
|
|
const bool FQDN_ALWAYS_INCLUDE = false;
|
|
|
|
// Enable A RR update delegation to the client (Disabled).
|
|
|
|
const bool FQDN_ALLOW_CLIENT_UPDATE = false;
|
|
|
|
// Globally enable updates (Enabled).
|
|
|
|
const bool FQDN_ENABLE_UPDATE = true;
|
|
|
|
// Do update, even if client requested no updates with N flag (Disabled).
|
|
|
|
const bool FQDN_OVERRIDE_NO_UPDATE = false;
|
|
|
|
// Server performs an update when client requested delegation (Enabled).
|
|
|
|
const bool FQDN_OVERRIDE_CLIENT_UPDATE = true;
|
|
|
|
// The fully qualified domain-name suffix if partial name provided by
|
|
|
|
// a client.
|
|
|
|
const char* FQDN_PARTIAL_SUFFIX = "example.com";
|
|
|
|
// Should server replace the domain-name supplied by the client (Disabled).
|
|
|
|
const bool FQDN_REPLACE_CLIENT_NAME = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-01-31 12:16:22 +00:00
|
|
|
/// @brief file name of a server-id file
|
|
|
|
///
|
|
|
|
/// Server must store its server identifier in persistent storage that must not
|
|
|
|
/// change between restarts. This is name of the file that is created in dataDir
|
|
|
|
/// (see isc::dhcp::CfgMgr::getDataDir()). It is a text file that uses
|
|
|
|
/// regular IPv4 address, e.g. 192.0.2.1. Server will create it during
|
|
|
|
/// first run and then use it afterwards.
|
|
|
|
static const char* SERVER_ID_FILE = "b10-dhcp4-serverid";
|
|
|
|
|
2011-12-21 16:37:11 +01:00
|
|
|
// These are hardcoded parameters. Currently this is a skeleton server that only
|
|
|
|
// grants those options and a single, fixed, hardcoded lease.
|
|
|
|
|
2013-04-29 11:00:22 +02:00
|
|
|
Dhcpv4Srv::Dhcpv4Srv(uint16_t port, const char* dbconfig, const bool use_bcast,
|
2013-07-11 13:31:01 +02:00
|
|
|
const bool direct_response_desired)
|
2013-08-19 15:08:08 +02:00
|
|
|
: serverid_(), shutdown_(true), alloc_engine_(), port_(port),
|
|
|
|
use_bcast_(use_bcast), hook_index_pkt4_receive_(-1),
|
2013-07-22 18:46:54 +02:00
|
|
|
hook_index_subnet4_select_(-1), hook_index_pkt4_send_(-1) {
|
|
|
|
|
2012-09-06 11:18:51 +01:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_START, DHCP4_OPEN_SOCKET).arg(port);
|
2012-07-23 16:35:54 +02:00
|
|
|
try {
|
2012-09-06 12:58:17 +01:00
|
|
|
// First call to instance() will create IfaceMgr (it's a singleton)
|
2013-04-25 19:32:28 +02:00
|
|
|
// it may throw something if things go wrong.
|
2013-05-21 10:45:22 +02:00
|
|
|
// The 'true' value of the call to setMatchingPacketFilter imposes
|
2013-04-25 19:32:28 +02:00
|
|
|
// that IfaceMgr will try to use the mechanism to respond directly
|
|
|
|
// to the client which doesn't have address assigned. This capability
|
|
|
|
// may be lacking on some OSes, so there is no guarantee that server
|
|
|
|
// will be able to respond directly.
|
2013-04-29 11:00:22 +02:00
|
|
|
IfaceMgr::instance().setMatchingPacketFilter(direct_response_desired);
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
if (port) {
|
|
|
|
// open sockets only if port is non-zero. Port 0 is used
|
|
|
|
// for non-socket related testing.
|
2013-07-11 13:31:01 +02:00
|
|
|
IfaceMgr::instance().openSockets4(port_, use_bcast_);
|
2012-12-31 16:49:37 +01:00
|
|
|
}
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2013-01-14 17:57:26 +01:00
|
|
|
string srvid_file = CfgMgr::instance().getDataDir() + "/" + string(SERVER_ID_FILE);
|
|
|
|
if (loadServerID(srvid_file)) {
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_START, DHCP4_SERVERID_LOADED)
|
2013-01-30 09:35:48 -06:00
|
|
|
.arg(srvidToString(getServerID()))
|
2013-01-14 17:57:26 +01:00
|
|
|
.arg(srvid_file);
|
|
|
|
} else {
|
|
|
|
generateServerID();
|
|
|
|
LOG_INFO(dhcp4_logger, DHCP4_SERVERID_GENERATED)
|
|
|
|
.arg(srvidToString(getServerID()))
|
|
|
|
.arg(srvid_file);
|
|
|
|
|
|
|
|
if (!writeServerID(srvid_file)) {
|
|
|
|
LOG_WARN(dhcp4_logger, DHCP4_SERVERID_WRITE_FAIL)
|
|
|
|
.arg(srvid_file);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2012-09-06 11:18:51 +01:00
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
// Instantiate LeaseMgr
|
|
|
|
LeaseMgrFactory::create(dbconfig);
|
|
|
|
LOG_INFO(dhcp4_logger, DHCP4_DB_BACKEND_STARTED)
|
|
|
|
.arg(LeaseMgrFactory::instance().getType())
|
|
|
|
.arg(LeaseMgrFactory::instance().getName());
|
|
|
|
|
|
|
|
// Instantiate allocation engine
|
|
|
|
alloc_engine_.reset(new AllocEngine(AllocEngine::ALLOC_ITERATIVE, 100));
|
|
|
|
|
2013-07-15 18:41:19 +02:00
|
|
|
// Register hook points
|
|
|
|
hook_index_pkt4_receive_ = Hooks.hook_index_pkt4_receive_;
|
|
|
|
hook_index_subnet4_select_ = Hooks.hook_index_subnet4_select_;
|
|
|
|
hook_index_pkt4_send_ = Hooks.hook_index_pkt4_send_;
|
|
|
|
|
|
|
|
/// @todo call loadLibraries() when handling configuration changes
|
|
|
|
|
2012-07-23 16:35:54 +02:00
|
|
|
} catch (const std::exception &e) {
|
2012-09-06 11:18:51 +01:00
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_SRV_CONSTRUCT_ERROR).arg(e.what());
|
2012-07-23 16:35:54 +02:00
|
|
|
shutdown_ = true;
|
|
|
|
return;
|
|
|
|
}
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2011-12-12 18:04:12 +01:00
|
|
|
shutdown_ = false;
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
Dhcpv4Srv::~Dhcpv4Srv() {
|
2011-12-12 19:24:36 +01:00
|
|
|
IfaceMgr::instance().closeSockets();
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::shutdown() {
|
2012-09-06 11:18:51 +01:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_BASIC, DHCP4_SHUTDOWN_REQUEST);
|
2012-05-30 18:36:58 +02:00
|
|
|
shutdown_ = true;
|
|
|
|
}
|
|
|
|
|
2013-07-19 15:54:02 +02:00
|
|
|
Pkt4Ptr
|
|
|
|
Dhcpv4Srv::receivePacket(int timeout) {
|
2013-07-15 18:41:19 +02:00
|
|
|
return (IfaceMgr::instance().receive4(timeout));
|
|
|
|
}
|
|
|
|
|
2013-07-19 15:54:02 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::sendPacket(const Pkt4Ptr& packet) {
|
2013-07-15 18:41:19 +02:00
|
|
|
IfaceMgr::instance().send(packet);
|
|
|
|
}
|
|
|
|
|
2011-11-27 19:35:47 +08:00
|
|
|
bool
|
|
|
|
Dhcpv4Srv::run() {
|
2011-12-12 18:04:12 +01:00
|
|
|
while (!shutdown_) {
|
2012-05-30 18:36:58 +02:00
|
|
|
/// @todo: calculate actual timeout once we have lease database
|
2013-06-12 11:34:33 +02:00
|
|
|
//cppcheck-suppress variableScope This is temporary anyway
|
|
|
|
const int timeout = 1000;
|
2012-05-30 18:36:58 +02:00
|
|
|
|
2012-03-08 14:52:46 +01:00
|
|
|
// client's message and server's response
|
2012-09-26 12:01:03 +02:00
|
|
|
Pkt4Ptr query;
|
2012-03-08 14:52:46 +01:00
|
|
|
Pkt4Ptr rsp;
|
2011-12-07 15:00:37 +01:00
|
|
|
|
2012-09-26 12:01:03 +02:00
|
|
|
try {
|
2013-07-15 18:41:19 +02:00
|
|
|
query = receivePacket(timeout);
|
2012-09-26 12:01:03 +02:00
|
|
|
} catch (const std::exception& e) {
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_PACKET_RECEIVE_FAIL).arg(e.what());
|
|
|
|
}
|
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Timeout may be reached or signal received, which breaks select()
|
|
|
|
// with no reception ocurred
|
|
|
|
if (!query) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool skip_unpack = false;
|
|
|
|
|
|
|
|
// The packet has just been received so contains the uninterpreted wire
|
2013-08-20 14:02:27 +02:00
|
|
|
// data; execute callouts registered for buffer4_receive.
|
2013-08-23 11:26:36 +02:00
|
|
|
if (HooksManager::getHooksManager()
|
|
|
|
.calloutsPresent(Hooks.hook_index_buffer4_receive_)) {
|
2013-08-19 15:08:08 +02:00
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(query);
|
|
|
|
|
|
|
|
// Delete previously set arguments
|
|
|
|
callout_handle->deleteAllArguments();
|
|
|
|
|
|
|
|
// Pass incoming packet as argument
|
|
|
|
callout_handle->setArgument("query4", query);
|
|
|
|
|
|
|
|
// Call callouts
|
2013-08-23 11:26:36 +02:00
|
|
|
HooksManager::callCallouts(Hooks.hook_index_buffer4_receive_,
|
|
|
|
*callout_handle);
|
2013-08-19 15:08:08 +02:00
|
|
|
|
|
|
|
// Callouts decided to skip the next processing step. The next
|
|
|
|
// processing step would to parse the packet, so skip at this
|
|
|
|
// stage means that callouts did the parsing already, so server
|
|
|
|
// should skip parsing.
|
|
|
|
if (callout_handle->getSkip()) {
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_HOOKS, DHCP4_HOOK_BUFFER_RCVD_SKIP);
|
|
|
|
skip_unpack = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
callout_handle->getArgument("query4", query);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unpack the packet information unless the buffer4_receive callouts
|
|
|
|
// indicated they did it
|
|
|
|
if (!skip_unpack) {
|
2011-12-12 19:24:36 +01:00
|
|
|
try {
|
|
|
|
query->unpack();
|
|
|
|
} catch (const std::exception& e) {
|
2012-09-06 11:18:51 +01:00
|
|
|
// Failed to parse the packet.
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL,
|
|
|
|
DHCP4_PACKET_PARSE_FAIL).arg(e.what());
|
2011-11-27 19:35:47 +08:00
|
|
|
continue;
|
|
|
|
}
|
2013-08-19 15:08:08 +02:00
|
|
|
}
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-20 14:02:27 +02:00
|
|
|
// When receiving a packet without message type option, getType() will
|
|
|
|
// throw. Let's set type to -1 as default error indicator.
|
|
|
|
int type = -1;
|
|
|
|
try {
|
|
|
|
type = query->getType();
|
2013-08-20 14:52:24 +02:00
|
|
|
} catch (...) {
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, DHCP4_PACKET_DROP_NO_TYPE)
|
|
|
|
.arg(query->getIface());
|
|
|
|
continue;
|
2013-08-20 14:02:27 +02:00
|
|
|
}
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, DHCP4_PACKET_RECEIVED)
|
2013-08-20 14:52:24 +02:00
|
|
|
.arg(serverReceivedPacketName(type))
|
2013-08-20 14:02:27 +02:00
|
|
|
.arg(type)
|
2013-08-19 15:08:08 +02:00
|
|
|
.arg(query->getIface());
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL_DATA, DHCP4_QUERY_DATA)
|
2013-08-20 14:02:27 +02:00
|
|
|
.arg(type)
|
2013-08-19 15:08:08 +02:00
|
|
|
.arg(query->toText());
|
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
// Let's execute all callouts registered for pkt4_receive
|
2013-08-19 15:08:08 +02:00
|
|
|
if (HooksManager::calloutsPresent(hook_index_pkt4_receive_)) {
|
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(query);
|
|
|
|
|
|
|
|
// Delete previously set arguments
|
|
|
|
callout_handle->deleteAllArguments();
|
|
|
|
|
|
|
|
// Pass incoming packet as argument
|
|
|
|
callout_handle->setArgument("query4", query);
|
|
|
|
|
|
|
|
// Call callouts
|
|
|
|
HooksManager::callCallouts(hook_index_pkt4_receive_,
|
|
|
|
*callout_handle);
|
|
|
|
|
|
|
|
// Callouts decided to skip the next processing step. The next
|
|
|
|
// processing step would to process the packet, so skip at this
|
|
|
|
// stage means drop.
|
|
|
|
if (callout_handle->getSkip()) {
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_HOOKS, DHCP4_HOOK_PACKET_RCVD_SKIP);
|
|
|
|
continue;
|
|
|
|
}
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
callout_handle->getArgument("query4", query);
|
|
|
|
}
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
try {
|
|
|
|
switch (query->getType()) {
|
|
|
|
case DHCPDISCOVER:
|
|
|
|
rsp = processDiscover(query);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DHCPREQUEST:
|
|
|
|
// Note that REQUEST is used for many things in DHCPv4: for
|
|
|
|
// requesting new leases, renewing existing ones and even
|
|
|
|
// for rebinding.
|
|
|
|
rsp = processRequest(query);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DHCPRELEASE:
|
|
|
|
processRelease(query);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DHCPDECLINE:
|
|
|
|
processDecline(query);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case DHCPINFORM:
|
|
|
|
processInform(query);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
// Only action is to output a message if debug is enabled,
|
|
|
|
// and that is covered by the debug statement before the
|
|
|
|
// "switch" statement.
|
|
|
|
;
|
2013-07-15 18:41:19 +02:00
|
|
|
}
|
2013-08-19 15:08:08 +02:00
|
|
|
} catch (const isc::Exception& e) {
|
|
|
|
|
|
|
|
// Catch-all exception (at least for ones based on the isc
|
|
|
|
// Exception class, which covers more or less all that
|
|
|
|
// are explicitly raised in the BIND 10 code). Just log
|
|
|
|
// the problem and ignore the packet. (The problem is logged
|
|
|
|
// as a debug message because debug is disabled by default -
|
|
|
|
// it prevents a DDOS attack based on the sending of problem
|
|
|
|
// packets.)
|
|
|
|
if (dhcp4_logger.isDebugEnabled(DBG_DHCP4_BASIC)) {
|
|
|
|
std::string source = "unknown";
|
|
|
|
HWAddrPtr hwptr = query->getHWAddr();
|
|
|
|
if (hwptr) {
|
|
|
|
source = hwptr->toText();
|
2013-02-11 13:42:18 +00:00
|
|
|
}
|
2013-08-19 15:08:08 +02:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_BASIC,
|
|
|
|
DHCP4_PACKET_PROCESS_FAIL)
|
|
|
|
.arg(source).arg(e.what());
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
2013-08-19 15:08:08 +02:00
|
|
|
}
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
if (!rsp) {
|
|
|
|
continue;
|
|
|
|
}
|
2013-05-21 15:18:58 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
adjustRemoteAddr(query, rsp);
|
2013-05-21 15:18:58 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
if (!rsp->getHops()) {
|
|
|
|
rsp->setRemotePort(DHCP4_CLIENT_PORT);
|
|
|
|
} else {
|
|
|
|
rsp->setRemotePort(DHCP4_SERVER_PORT);
|
|
|
|
}
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
rsp->setLocalAddr(query->getLocalAddr());
|
|
|
|
rsp->setLocalPort(DHCP4_SERVER_PORT);
|
|
|
|
rsp->setIface(query->getIface());
|
|
|
|
rsp->setIndex(query->getIndex());
|
2011-11-30 19:00:57 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Specifies if server should do the packing
|
|
|
|
bool skip_pack = false;
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
// Execute all callouts registered for pkt4_send
|
2013-08-19 15:08:08 +02:00
|
|
|
if (HooksManager::calloutsPresent(hook_index_pkt4_send_)) {
|
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(query);
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Delete all previous arguments
|
|
|
|
callout_handle->deleteAllArguments();
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Clear skip flag if it was set in previous callouts
|
|
|
|
callout_handle->setSkip(false);
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Set our response
|
|
|
|
callout_handle->setArgument("response4", rsp);
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Call all installed callouts
|
|
|
|
HooksManager::callCallouts(hook_index_pkt4_send_,
|
|
|
|
*callout_handle);
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Callouts decided to skip the next processing step. The next
|
|
|
|
// processing step would to send the packet, so skip at this
|
|
|
|
// stage means "drop response".
|
|
|
|
if (callout_handle->getSkip()) {
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_HOOKS, DHCP4_HOOK_PACKET_SEND_SKIP);
|
|
|
|
skip_pack = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!skip_pack) {
|
|
|
|
try {
|
|
|
|
rsp->pack();
|
|
|
|
} catch (const std::exception& e) {
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_PACKET_SEND_FAIL)
|
|
|
|
.arg(e.what());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
// Now all fields and options are constructed into output wire buffer.
|
|
|
|
// Option objects modification does not make sense anymore. Hooks
|
|
|
|
// can only manipulate wire buffer at this stage.
|
2013-08-23 11:26:36 +02:00
|
|
|
// Let's execute all callouts registered for buffer4_send
|
|
|
|
if (HooksManager::getHooksManager()
|
|
|
|
.calloutsPresent(Hooks.hook_index_buffer4_send_)) {
|
2013-08-19 15:08:08 +02:00
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(query);
|
2012-09-06 15:40:12 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Delete previously set arguments
|
|
|
|
callout_handle->deleteAllArguments();
|
2012-09-06 15:40:12 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Pass incoming packet as argument
|
|
|
|
callout_handle->setArgument("response4", rsp);
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Call callouts
|
2013-08-23 11:26:36 +02:00
|
|
|
HooksManager::callCallouts(Hooks.hook_index_buffer4_send_,
|
|
|
|
*callout_handle);
|
2012-09-06 15:40:12 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Callouts decided to skip the next processing step. The next
|
|
|
|
// processing step would to parse the packet, so skip at this
|
|
|
|
// stage means drop.
|
|
|
|
if (callout_handle->getSkip()) {
|
2013-08-23 11:26:36 +02:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_HOOKS,
|
|
|
|
DHCP4_HOOK_BUFFER_SEND_SKIP);
|
2013-08-19 15:08:08 +02:00
|
|
|
continue;
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
2013-08-19 15:08:08 +02:00
|
|
|
|
|
|
|
callout_handle->getArgument("response4", rsp);
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
2013-08-19 15:08:08 +02:00
|
|
|
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL_DATA,
|
|
|
|
DHCP4_RESPONSE_DATA)
|
|
|
|
.arg(static_cast<int>(rsp->getType())).arg(rsp->toText());
|
|
|
|
|
|
|
|
sendPacket(rsp);
|
|
|
|
} catch (const std::exception& e) {
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_PACKET_SEND_FAIL)
|
|
|
|
.arg(e.what());
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
2013-09-10 08:27:44 +02:00
|
|
|
|
|
|
|
// Send NameChangeRequests to the b10-dhcp_ddns module.
|
|
|
|
sendNameChangeRequests();
|
2013-01-14 17:57:26 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return (true);
|
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
bool
|
|
|
|
Dhcpv4Srv::loadServerID(const std::string& file_name) {
|
2011-11-27 19:35:47 +08:00
|
|
|
|
2013-01-14 17:57:26 +01:00
|
|
|
// load content of the file into a string
|
|
|
|
fstream f(file_name.c_str(), ios::in);
|
|
|
|
if (!f.is_open()) {
|
|
|
|
return (false);
|
|
|
|
}
|
|
|
|
|
|
|
|
string hex_string;
|
|
|
|
f >> hex_string;
|
|
|
|
f.close();
|
|
|
|
|
|
|
|
// remove any spaces
|
|
|
|
boost::algorithm::erase_all(hex_string, " ");
|
|
|
|
|
|
|
|
try {
|
|
|
|
IOAddress addr(hex_string);
|
|
|
|
|
2013-01-17 12:50:14 +01:00
|
|
|
if (!addr.isV4()) {
|
2013-01-14 17:57:26 +01:00
|
|
|
return (false);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now create server-id option
|
|
|
|
serverid_.reset(new Option4AddrLst(DHO_DHCP_SERVER_IDENTIFIER, addr));
|
|
|
|
|
|
|
|
} catch(...) {
|
|
|
|
// any kind of malformed input (empty string, IPv6 address, complete
|
|
|
|
// garbate etc.)
|
|
|
|
return (false);
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return (true);
|
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::generateServerID() {
|
2013-01-14 17:57:26 +01:00
|
|
|
|
|
|
|
const IfaceMgr::IfaceCollection& ifaces = IfaceMgr::instance().getIfaces();
|
|
|
|
|
|
|
|
// Let's find suitable interface.
|
|
|
|
for (IfaceMgr::IfaceCollection::const_iterator iface = ifaces.begin();
|
|
|
|
iface != ifaces.end(); ++iface) {
|
|
|
|
|
|
|
|
// Let's don't use loopback.
|
|
|
|
if (iface->flag_loopback_) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Let's skip downed interfaces. It is better to use working ones.
|
|
|
|
if (!iface->flag_up_) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2013-04-03 12:20:40 +02:00
|
|
|
const Iface::AddressCollection addrs = iface->getAddresses();
|
2013-01-14 17:57:26 +01:00
|
|
|
|
2013-04-03 12:20:40 +02:00
|
|
|
for (Iface::AddressCollection::const_iterator addr = addrs.begin();
|
2013-01-14 17:57:26 +01:00
|
|
|
addr != addrs.end(); ++addr) {
|
|
|
|
if (addr->getFamily() != AF_INET) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
serverid_ = OptionPtr(new Option4AddrLst(DHO_DHCP_SERVER_IDENTIFIER,
|
|
|
|
*addr));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_throw(BadValue, "No suitable interfaces for server-identifier found");
|
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
bool
|
|
|
|
Dhcpv4Srv::writeServerID(const std::string& file_name) {
|
2013-01-14 17:57:26 +01:00
|
|
|
fstream f(file_name.c_str(), ios::out | ios::trunc);
|
|
|
|
if (!f.good()) {
|
|
|
|
return (false);
|
|
|
|
}
|
|
|
|
f << srvidToString(getServerID());
|
|
|
|
f.close();
|
2013-01-30 19:07:54 +01:00
|
|
|
return (true);
|
2013-01-14 17:57:26 +01:00
|
|
|
}
|
|
|
|
|
2013-03-28 16:16:28 +01:00
|
|
|
string
|
2013-01-30 19:07:54 +01:00
|
|
|
Dhcpv4Srv::srvidToString(const OptionPtr& srvid) {
|
2013-01-14 17:57:26 +01:00
|
|
|
if (!srvid) {
|
|
|
|
isc_throw(BadValue, "NULL pointer passed to srvidToString()");
|
|
|
|
}
|
|
|
|
boost::shared_ptr<Option4AddrLst> generated =
|
|
|
|
boost::dynamic_pointer_cast<Option4AddrLst>(srvid);
|
|
|
|
if (!srvid) {
|
|
|
|
isc_throw(BadValue, "Pointer to invalid option passed to srvidToString()");
|
|
|
|
}
|
|
|
|
|
|
|
|
Option4AddrLst::AddressContainer addrs = generated->getAddresses();
|
|
|
|
if (addrs.size() != 1) {
|
|
|
|
isc_throw(BadValue, "Malformed option passed to srvidToString(). "
|
|
|
|
<< "Expected to contain a single IPv4 address.");
|
|
|
|
}
|
|
|
|
|
|
|
|
return (addrs[0].toText());
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
2013-09-02 17:21:11 +02:00
|
|
|
isc::dhcp_ddns::D2Dhcid
|
2013-09-03 18:39:48 +02:00
|
|
|
Dhcpv4Srv::computeDhcid(const Lease4Ptr& lease) {
|
|
|
|
if (!lease) {
|
|
|
|
isc_throw(DhcidComputeError, "a pointer to the lease must be not"
|
|
|
|
" NULL to compute DHCID");
|
|
|
|
|
|
|
|
} else if (lease->hostname_.empty()) {
|
|
|
|
isc_throw(DhcidComputeError, "unable to compute the DHCID for the"
|
|
|
|
" lease which has empty hostname set");
|
|
|
|
|
2013-09-02 17:21:11 +02:00
|
|
|
}
|
|
|
|
|
2013-09-03 18:39:48 +02:00
|
|
|
// In order to compute DHCID the client's hostname must be encoded in
|
|
|
|
// canonical wire format. It is unlikely that the FQDN is malformed
|
|
|
|
// because it is validated by the classes which encapsulate options
|
|
|
|
// carrying client FQDN. However, if the client name was carried in the
|
|
|
|
// Hostname option it is more likely as it carries the hostname as a
|
|
|
|
// regular string.
|
|
|
|
std::vector<uint8_t> fqdn_wire;
|
|
|
|
try {
|
|
|
|
OptionDataTypeUtil::writeFqdn(lease->hostname_, fqdn_wire, true);
|
2013-09-02 17:21:11 +02:00
|
|
|
|
2013-09-03 18:39:48 +02:00
|
|
|
} catch (const Exception& ex) {
|
|
|
|
isc_throw(DhcidComputeError, "unable to compute DHCID because the"
|
|
|
|
" hostname: " << lease->hostname_ << " is invalid");
|
2013-09-02 17:21:11 +02:00
|
|
|
|
|
|
|
}
|
2013-09-03 18:39:48 +02:00
|
|
|
|
|
|
|
// Prefer client id to HW address to compute DHCID. If Client Id is
|
|
|
|
// NULL, use HW address.
|
2013-09-02 17:21:11 +02:00
|
|
|
try {
|
2013-09-03 18:39:48 +02:00
|
|
|
if (lease->client_id_) {
|
|
|
|
return (D2Dhcid(lease->client_id_->getClientId(), fqdn_wire));
|
|
|
|
|
|
|
|
} else {
|
|
|
|
HWAddrPtr hwaddr(new HWAddr(lease->hwaddr_, HTYPE_ETHER));
|
|
|
|
return (D2Dhcid(hwaddr, fqdn_wire));
|
|
|
|
}
|
2013-09-02 17:21:11 +02:00
|
|
|
} catch (const Exception& ex) {
|
2013-09-03 18:39:48 +02:00
|
|
|
isc_throw(DhcidComputeError, "unable to compute DHCID: "
|
|
|
|
<< ex.what());
|
2013-09-02 17:21:11 +02:00
|
|
|
|
2013-09-03 18:39:48 +02:00
|
|
|
}
|
2013-09-02 17:21:11 +02:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::copyDefaultFields(const Pkt4Ptr& question, Pkt4Ptr& answer) {
|
2011-12-21 16:37:11 +01:00
|
|
|
answer->setIface(question->getIface());
|
|
|
|
answer->setIndex(question->getIndex());
|
|
|
|
answer->setCiaddr(question->getCiaddr());
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2013-04-09 08:15:22 -05:00
|
|
|
answer->setSiaddr(IOAddress("0.0.0.0")); // explicitly set this to 0
|
2011-12-21 16:37:11 +01:00
|
|
|
answer->setHops(question->getHops());
|
2011-12-20 19:59:14 +01:00
|
|
|
|
|
|
|
// copy MAC address
|
2012-12-27 19:45:00 +01:00
|
|
|
answer->setHWAddr(question->getHWAddr());
|
2011-12-20 19:59:14 +01:00
|
|
|
|
|
|
|
// relay address
|
2011-12-21 16:37:11 +01:00
|
|
|
answer->setGiaddr(question->getGiaddr());
|
|
|
|
|
2013-01-08 13:53:34 +01:00
|
|
|
// Let's copy client-id to response. See RFC6842.
|
2012-12-31 16:49:37 +01:00
|
|
|
OptionPtr client_id = question->getOption(DHO_DHCP_CLIENT_IDENTIFIER);
|
|
|
|
if (client_id) {
|
|
|
|
answer->addOption(client_id);
|
|
|
|
}
|
2013-04-29 19:05:22 +02:00
|
|
|
|
|
|
|
// If src/dest HW addresses are used by the packet filtering class
|
2013-05-21 10:45:22 +02:00
|
|
|
// we need to copy them as well. There is a need to check that the
|
|
|
|
// address being set is not-NULL because an attempt to set the NULL
|
|
|
|
// HW would result in exception. If these values are not set, the
|
|
|
|
// the default HW addresses (zeroed) should be generated by the
|
|
|
|
// packet filtering class when creating Ethernet header for
|
|
|
|
// outgoing packet.
|
2013-04-29 19:05:22 +02:00
|
|
|
HWAddrPtr src_hw_addr = question->getLocalHWAddr();
|
|
|
|
if (src_hw_addr) {
|
2013-04-29 19:42:58 +02:00
|
|
|
answer->setLocalHWAddr(src_hw_addr);
|
2013-04-29 19:05:22 +02:00
|
|
|
}
|
2013-04-29 19:42:58 +02:00
|
|
|
HWAddrPtr dst_hw_addr = question->getRemoteHWAddr();
|
2013-04-29 19:05:22 +02:00
|
|
|
if (dst_hw_addr) {
|
2013-04-29 19:42:58 +02:00
|
|
|
answer->setRemoteHWAddr(dst_hw_addr);
|
2013-04-29 19:05:22 +02:00
|
|
|
}
|
2011-12-21 16:37:11 +01:00
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::appendDefaultOptions(Pkt4Ptr& msg, uint8_t msg_type) {
|
2012-02-03 16:54:41 +01:00
|
|
|
OptionPtr opt;
|
2011-12-20 19:59:14 +01:00
|
|
|
|
|
|
|
// add Message Type Option (type 53)
|
2013-01-08 12:07:07 +01:00
|
|
|
msg->setType(msg_type);
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2011-12-23 17:26:24 +01:00
|
|
|
// DHCP Server Identifier (type 54)
|
2012-12-31 16:49:37 +01:00
|
|
|
msg->addOption(getServerID());
|
2011-12-23 17:26:24 +01:00
|
|
|
|
2011-12-21 16:37:11 +01:00
|
|
|
// more options will be added here later
|
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::appendRequestedOptions(const Pkt4Ptr& question, Pkt4Ptr& msg) {
|
2013-01-15 19:53:58 +01:00
|
|
|
|
|
|
|
// Get the subnet relevant for the client. We will need it
|
|
|
|
// to get the options associated with it.
|
|
|
|
Subnet4Ptr subnet = selectSubnet(question);
|
|
|
|
// If we can't find the subnet for the client there is no way
|
|
|
|
// to get the options to be sent to a client. We don't log an
|
|
|
|
// error because it will be logged by the assignLease method
|
|
|
|
// anyway.
|
|
|
|
if (!subnet) {
|
|
|
|
return;
|
|
|
|
}
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-01-15 19:53:58 +01:00
|
|
|
// try to get the 'Parameter Request List' option which holds the
|
|
|
|
// codes of requested options.
|
|
|
|
OptionUint8ArrayPtr option_prl = boost::dynamic_pointer_cast<
|
|
|
|
OptionUint8Array>(question->getOption(DHO_DHCP_PARAMETER_REQUEST_LIST));
|
|
|
|
// If there is no PRL option in the message from the client then
|
|
|
|
// there is nothing to do.
|
|
|
|
if (!option_prl) {
|
|
|
|
return;
|
|
|
|
}
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-01-15 19:53:58 +01:00
|
|
|
// Get the codes of requested options.
|
|
|
|
const std::vector<uint8_t>& requested_opts = option_prl->getValues();
|
|
|
|
// For each requested option code get the instance of the option
|
|
|
|
// to be returned to the client.
|
|
|
|
for (std::vector<uint8_t>::const_iterator opt = requested_opts.begin();
|
|
|
|
opt != requested_opts.end(); ++opt) {
|
|
|
|
Subnet::OptionDescriptor desc =
|
|
|
|
subnet->getOptionDescriptor("dhcp4", *opt);
|
|
|
|
if (desc.option) {
|
|
|
|
msg->addOption(desc.option);
|
|
|
|
}
|
|
|
|
}
|
2011-12-23 17:26:24 +01:00
|
|
|
}
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-01-22 18:40:55 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::appendBasicOptions(const Pkt4Ptr& question, Pkt4Ptr& msg) {
|
|
|
|
// Identify options that we always want to send to the
|
|
|
|
// client (if they are configured).
|
|
|
|
static const uint16_t required_options[] = {
|
|
|
|
DHO_SUBNET_MASK,
|
|
|
|
DHO_ROUTERS,
|
|
|
|
DHO_DOMAIN_NAME_SERVERS,
|
|
|
|
DHO_DOMAIN_NAME };
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-01-22 18:40:55 +01:00
|
|
|
static size_t required_options_size =
|
|
|
|
sizeof(required_options) / sizeof(required_options[0]);
|
|
|
|
|
|
|
|
// Get the subnet.
|
|
|
|
Subnet4Ptr subnet = selectSubnet(question);
|
|
|
|
if (!subnet) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to find all 'required' options in the outgoing
|
|
|
|
// message. Those that are not present will be added.
|
|
|
|
for (int i = 0; i < required_options_size; ++i) {
|
|
|
|
OptionPtr opt = msg->getOption(required_options[i]);
|
|
|
|
if (!opt) {
|
|
|
|
// Check whether option has been configured.
|
|
|
|
Subnet::OptionDescriptor desc =
|
|
|
|
subnet->getOptionDescriptor("dhcp4", required_options[i]);
|
|
|
|
if (desc.option) {
|
|
|
|
msg->addOption(desc.option);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-12-23 17:26:24 +01:00
|
|
|
}
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-08-28 14:46:29 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::processClientName(const Pkt4Ptr& query, Pkt4Ptr& answer) {
|
|
|
|
// It is possible that client has sent both Client FQDN and Hostname
|
|
|
|
// option. In such case, server should prefer Client FQDN option and
|
|
|
|
// ignore the Hostname option.
|
|
|
|
Option4ClientFqdnPtr fqdn = boost::dynamic_pointer_cast<Option4ClientFqdn>
|
|
|
|
(query->getOption(DHO_FQDN));
|
|
|
|
if (fqdn) {
|
2013-08-28 16:15:56 +02:00
|
|
|
processClientFqdnOption(fqdn, answer);
|
2013-08-28 14:46:29 +02:00
|
|
|
|
|
|
|
} else {
|
|
|
|
OptionCustomPtr hostname = boost::dynamic_pointer_cast<OptionCustom>
|
|
|
|
(query->getOption(DHO_HOST_NAME));
|
|
|
|
if (hostname) {
|
2013-09-09 12:28:06 +02:00
|
|
|
processHostnameOption(hostname, answer);
|
2013-08-28 14:46:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-08-28 16:15:56 +02:00
|
|
|
Dhcpv4Srv::processClientFqdnOption(const Option4ClientFqdnPtr& fqdn,
|
|
|
|
Pkt4Ptr& answer) {
|
|
|
|
// Create the DHCPv4 Client FQDN Option to be included in the server's
|
|
|
|
// response to a client.
|
|
|
|
Option4ClientFqdnPtr fqdn_resp(new Option4ClientFqdn(*fqdn));
|
|
|
|
|
|
|
|
// RFC4702, section 4 - set 'NOS' flags to 0.
|
|
|
|
fqdn_resp->setFlag(Option4ClientFqdn::FLAG_S, 0);
|
|
|
|
fqdn_resp->setFlag(Option4ClientFqdn::FLAG_O, 0);
|
|
|
|
fqdn_resp->setFlag(Option4ClientFqdn::FLAG_N, 0);
|
|
|
|
|
2013-09-02 17:19:53 +02:00
|
|
|
// Conditions when N flag has to be set to indicate that server will not
|
|
|
|
// perform DNS updates:
|
|
|
|
// 1. Updates are globally disabled,
|
|
|
|
// 2. Client requested no update and server respects it,
|
|
|
|
// 3. Client requested that the foward DNS update is delegated to the client
|
|
|
|
// but server neither respects requests for forward update delegation nor
|
|
|
|
// it is configured to send update on its own when client requested
|
|
|
|
// delegation.
|
|
|
|
if (!FQDN_ENABLE_UPDATE ||
|
|
|
|
(fqdn->getFlag(Option4ClientFqdn::FLAG_N) &&
|
|
|
|
!FQDN_OVERRIDE_NO_UPDATE) ||
|
|
|
|
(!fqdn->getFlag(Option4ClientFqdn::FLAG_S) &&
|
|
|
|
!FQDN_ALLOW_CLIENT_UPDATE && !FQDN_OVERRIDE_CLIENT_UPDATE)) {
|
|
|
|
fqdn_resp->setFlag(Option4ClientFqdn::FLAG_N, true);
|
|
|
|
|
|
|
|
// Conditions when S flag is set to indicate that server will perform DNS
|
|
|
|
// update on its own:
|
|
|
|
// 1. Client requested that server performs DNS update and DNS updates are
|
|
|
|
// globally enabled.
|
|
|
|
// 2. Client requested that server delegates forward update to the client
|
|
|
|
// but server doesn't respect requests for delegation and it is
|
|
|
|
// configured to perform an update on its own when client requested the
|
|
|
|
// delegation.
|
|
|
|
} else if (fqdn->getFlag(Option4ClientFqdn::FLAG_S) ||
|
|
|
|
(!fqdn->getFlag(Option4ClientFqdn::FLAG_S) &&
|
|
|
|
!FQDN_ALLOW_CLIENT_UPDATE && FQDN_OVERRIDE_CLIENT_UPDATE)) {
|
|
|
|
fqdn_resp->setFlag(Option4ClientFqdn::FLAG_S, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Server MUST set the O flag if it has overriden the client's setting
|
|
|
|
// of S flag.
|
|
|
|
if (fqdn->getFlag(Option4ClientFqdn::FLAG_S) !=
|
|
|
|
fqdn_resp->getFlag(Option4ClientFqdn::FLAG_S)) {
|
|
|
|
fqdn_resp->setFlag(Option4ClientFqdn::FLAG_O, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If client suppled partial or empty domain-name, server should generate
|
|
|
|
// one.
|
|
|
|
if (fqdn->getDomainNameType() == Option4ClientFqdn::PARTIAL) {
|
|
|
|
std::ostringstream name;
|
2013-09-09 14:19:12 +02:00
|
|
|
if (fqdn->getDomainName().empty() || FQDN_REPLACE_CLIENT_NAME) {
|
2013-09-09 19:22:28 +02:00
|
|
|
fqdn_resp->setDomainName("", Option4ClientFqdn::PARTIAL);
|
|
|
|
|
2013-09-02 17:19:53 +02:00
|
|
|
} else {
|
|
|
|
name << fqdn->getDomainName();
|
2013-09-09 19:22:28 +02:00
|
|
|
name << "." << FQDN_PARTIAL_SUFFIX;
|
|
|
|
fqdn_resp->setDomainName(name.str(), Option4ClientFqdn::FULL);
|
|
|
|
|
2013-09-02 17:19:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Server may be configured to replace a name supplied by a client, even if
|
2013-09-09 19:22:28 +02:00
|
|
|
// client supplied fully qualified domain-name. The empty domain-name is
|
|
|
|
// is set to indicate that the name must be generated when the new lease
|
|
|
|
// is acquired.
|
2013-09-02 17:19:53 +02:00
|
|
|
} else if(FQDN_REPLACE_CLIENT_NAME) {
|
2013-09-09 19:22:28 +02:00
|
|
|
fqdn_resp->setDomainName("", Option4ClientFqdn::PARTIAL);
|
2013-09-02 17:19:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add FQDN option to the response message. Note that, there may be some
|
|
|
|
// cases when server may choose not to include the FQDN option in a
|
|
|
|
// response to a client. In such cases, the FQDN should be removed from the
|
|
|
|
// outgoing message. In theory we could cease to include the FQDN option
|
|
|
|
// in this function until it is confirmed that it should be included.
|
|
|
|
// However, we include it here for simplicity. Functions used to acquire
|
|
|
|
// lease for a client will scan the response message for FQDN and if it
|
|
|
|
// is found they will take necessary actions to store the FQDN information
|
|
|
|
// in the lease database as well as to generate NameChangeRequests to DNS.
|
|
|
|
// If we don't store the option in the reponse message, we will have to
|
|
|
|
// propagate it in the different way to the functions which acquire the
|
|
|
|
// lease. This would require modifications to the API of this class.
|
2013-08-28 16:15:56 +02:00
|
|
|
answer->addOption(fqdn_resp);
|
2013-08-28 14:46:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-09-09 12:28:06 +02:00
|
|
|
Dhcpv4Srv::processHostnameOption(const OptionCustomPtr& opt_hostname,
|
|
|
|
Pkt4Ptr& answer) {
|
2013-09-09 14:19:12 +02:00
|
|
|
// Do nothing if the DNS updates are disabled.
|
2013-09-09 12:28:06 +02:00
|
|
|
if (!FQDN_ENABLE_UPDATE) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string hostname = opt_hostname->readString();
|
2013-09-09 14:19:12 +02:00
|
|
|
unsigned int label_count = OptionDataTypeUtil::getLabelCount(hostname);
|
|
|
|
// Copy construct the hostname provided by the client. It is entirely
|
|
|
|
// possible that we will use the hostname option provided by the client
|
|
|
|
// to perform the DNS update and we will send the same option to him to
|
|
|
|
// indicate that we accepted this hostname.
|
|
|
|
OptionCustomPtr opt_hostname_resp(new OptionCustom(*opt_hostname));
|
|
|
|
|
|
|
|
// The hostname option may be unqualified or fully qualified. The lab_count
|
|
|
|
// holds the number of labels for the name. The number of 1 means that
|
|
|
|
// there is only root label "." (even for unqualified names, as the
|
|
|
|
// getLabelCount function treats each name as a fully qualified one).
|
|
|
|
// By checking the number of labels present in the hostname we may infer
|
|
|
|
// whether client has sent the fully qualified or unqualified hostname.
|
|
|
|
|
|
|
|
// If there is only one label, it is a root. We will have to generate
|
|
|
|
// the whole domain name for the client.
|
|
|
|
if (FQDN_REPLACE_CLIENT_NAME || (label_count < 2)) {
|
2013-09-09 19:22:28 +02:00
|
|
|
opt_hostname_resp->writeString("");
|
2013-09-09 14:19:12 +02:00
|
|
|
// If there are two labels, it means that the client has specified
|
|
|
|
// the unqualified name. We have to concatenate the unqalified name
|
|
|
|
// with the domain name.
|
|
|
|
} else if (label_count == 2) {
|
|
|
|
std::ostringstream resp_hostname;
|
|
|
|
resp_hostname << hostname << "." << FQDN_PARTIAL_SUFFIX << ".";
|
|
|
|
opt_hostname_resp->writeString(resp_hostname.str());
|
|
|
|
}
|
|
|
|
|
|
|
|
answer->addOption(opt_hostname_resp);
|
2013-08-28 14:46:29 +02:00
|
|
|
}
|
|
|
|
|
2013-09-03 18:39:48 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::createNameChangeRequests(const Lease4Ptr& lease,
|
2013-09-04 14:35:05 +02:00
|
|
|
const Lease4Ptr& old_lease) {
|
2013-09-03 18:39:48 +02:00
|
|
|
if (!lease) {
|
|
|
|
isc_throw(isc::Unexpected,
|
|
|
|
"NULL lease specified when creating NameChangeRequest");
|
|
|
|
}
|
|
|
|
|
2013-09-04 14:35:05 +02:00
|
|
|
// If old lease is not NULL, it is an indication that the lease has
|
|
|
|
// just been renewed. In such case we may need to generate the
|
|
|
|
// additional NameChangeRequest to remove an existing entry before
|
|
|
|
// we create a NameChangeRequest to add the entry for an updated lease.
|
|
|
|
// We may also decide not to generate any requests at all. This is when
|
|
|
|
// we discover that nothing has changed in the client's FQDN data.
|
|
|
|
if (old_lease) {
|
|
|
|
if (!lease->matches(*old_lease)) {
|
|
|
|
isc_throw(isc::Unexpected,
|
|
|
|
"there is no match between the current instance of the"
|
|
|
|
" lease: " << lease->toText() << ", and the previous"
|
|
|
|
" instance: " << lease->toText());
|
|
|
|
} else {
|
|
|
|
// There will be a NameChangeRequest generated to remove existing
|
|
|
|
// DNS entries if the following conditions are met:
|
|
|
|
// - The hostname is set for the existing lease, we can't generate
|
|
|
|
// removal request for non-existent hostname.
|
|
|
|
// - A server has performed reverse, forward or both updates.
|
|
|
|
// - FQDN data between the new and old lease do not match.
|
2013-09-09 10:24:54 +02:00
|
|
|
if ((lease->hostname_ != old_lease->hostname_) ||
|
2013-09-04 14:35:05 +02:00
|
|
|
(lease->fqdn_fwd_ != old_lease->fqdn_fwd_) ||
|
2013-09-09 10:24:54 +02:00
|
|
|
(lease->fqdn_rev_ != old_lease->fqdn_rev_)) {
|
|
|
|
queueNameChangeRequest(isc::dhcp_ddns::CHG_REMOVE,
|
|
|
|
old_lease);
|
2013-09-04 14:35:05 +02:00
|
|
|
|
|
|
|
// If FQDN data from both leases match, there is no need to update.
|
|
|
|
} else if ((lease->hostname_ == old_lease->hostname_) &&
|
|
|
|
(lease->fqdn_fwd_ == old_lease->fqdn_fwd_) &&
|
|
|
|
(lease->fqdn_rev_ == old_lease->fqdn_rev_)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-09 10:24:54 +02:00
|
|
|
// We may need to generate the NameChangeRequest for the new lease. It
|
|
|
|
// will be generated only if hostname is set and if forward or reverse
|
|
|
|
// update has been requested.
|
|
|
|
queueNameChangeRequest(isc::dhcp_ddns::CHG_ADD, lease);
|
2013-09-03 18:39:48 +02:00
|
|
|
}
|
|
|
|
|
2013-09-05 15:11:26 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::
|
2013-09-09 10:24:54 +02:00
|
|
|
queueNameChangeRequest(const isc::dhcp_ddns::NameChangeType chg_type,
|
|
|
|
const Lease4Ptr& lease) {
|
|
|
|
// The hostname must not be empty, and at least one type of update
|
|
|
|
// should be requested.
|
|
|
|
if (!lease || lease->hostname_.empty() ||
|
|
|
|
(!lease->fqdn_rev_ && !lease->fqdn_fwd_)) {
|
|
|
|
return;
|
|
|
|
}
|
2013-11-19 17:29:40 +01:00
|
|
|
|
|
|
|
// Create the DHCID for the NameChangeRequest.
|
2013-09-09 10:24:54 +02:00
|
|
|
D2Dhcid dhcid;
|
|
|
|
try {
|
|
|
|
dhcid = computeDhcid(lease);
|
|
|
|
} catch (const DhcidComputeError& ex) {
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_DHCID_COMPUTE_ERROR)
|
|
|
|
.arg(lease->toText())
|
|
|
|
.arg(ex.what());
|
|
|
|
return;
|
|
|
|
}
|
2013-11-19 17:29:40 +01:00
|
|
|
// Create NameChangeRequest
|
2013-09-09 10:24:54 +02:00
|
|
|
NameChangeRequest ncr(chg_type, lease->fqdn_fwd_, lease->fqdn_rev_,
|
|
|
|
lease->hostname_, lease->addr_.toText(),
|
|
|
|
dhcid, 0, lease->valid_lft_);
|
2013-11-19 17:29:40 +01:00
|
|
|
// And queue it.
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL_DATA, DHCP4_QUEUE_NCR)
|
|
|
|
.arg(chg_type == CHG_ADD ? "add" : "remove")
|
|
|
|
.arg(ncr.toText());
|
2013-09-05 15:11:26 +02:00
|
|
|
name_change_reqs_.push(ncr);
|
|
|
|
}
|
|
|
|
|
2013-09-10 08:27:44 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::sendNameChangeRequests() {
|
|
|
|
while (!name_change_reqs_.empty()) {
|
|
|
|
// @todo Once next NameChangeRequest is picked from the queue
|
|
|
|
// we should send it to the b10-dhcp_ddns module. Currently we
|
|
|
|
// just drop it.
|
|
|
|
name_change_reqs_.pop();
|
|
|
|
}
|
|
|
|
}
|
2013-09-09 10:24:54 +02:00
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::assignLease(const Pkt4Ptr& question, Pkt4Ptr& answer) {
|
2012-12-31 16:49:37 +01:00
|
|
|
|
|
|
|
// We need to select a subnet the client is connected in.
|
|
|
|
Subnet4Ptr subnet = selectSubnet(question);
|
|
|
|
if (!subnet) {
|
|
|
|
// This particular client is out of luck today. We do not have
|
|
|
|
// information about the subnet he is connected to. This likely means
|
|
|
|
// misconfiguration of the server (or some relays). We will continue to
|
|
|
|
// process this message, but our response will be almost useless: no
|
|
|
|
// addresses or prefixes, no subnet specific configuration etc. The only
|
|
|
|
// thing this client can get is some global information (like DNS
|
|
|
|
// servers).
|
|
|
|
|
|
|
|
// perhaps this should be logged on some higher level? This is most likely
|
|
|
|
// configuration bug.
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_SUBNET_SELECTION_FAILED)
|
|
|
|
.arg(question->getRemoteAddr().toText())
|
|
|
|
.arg(serverReceivedPacketName(question->getType()));
|
2013-01-08 12:07:07 +01:00
|
|
|
answer->setType(DHCPNAK);
|
2012-12-31 16:49:37 +01:00
|
|
|
answer->setYiaddr(IOAddress("0.0.0.0"));
|
|
|
|
return;
|
|
|
|
}
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2013-01-08 13:53:34 +01:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL_DATA, DHCP4_SUBNET_SELECTED)
|
|
|
|
.arg(subnet->toText());
|
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
// Get client-id option
|
|
|
|
ClientIdPtr client_id;
|
|
|
|
OptionPtr opt = question->getOption(DHO_DHCP_CLIENT_IDENTIFIER);
|
|
|
|
if (opt) {
|
|
|
|
client_id = ClientIdPtr(new ClientId(opt->getData()));
|
|
|
|
}
|
|
|
|
// client-id is not mandatory in DHCPv4
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
IOAddress hint = question->getYiaddr();
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
HWAddrPtr hwaddr = question->getHWAddr();
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
// "Fake" allocation is processing of DISCOVER message. We pretend to do an
|
|
|
|
// allocation, but we do not put the lease in the database. That is ok,
|
|
|
|
// because we do not guarantee that the user will get that exact lease. If
|
|
|
|
// the user selects this server to do actual allocation (i.e. sends REQUEST)
|
|
|
|
// it should include this hint. That will help us during the actual lease
|
|
|
|
// allocation.
|
2013-01-08 13:53:34 +01:00
|
|
|
bool fake_allocation = (question->getType() == DHCPDISCOVER);
|
2012-12-31 16:49:37 +01:00
|
|
|
|
2013-07-16 13:29:41 +02:00
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(question);
|
|
|
|
|
2013-09-09 10:24:54 +02:00
|
|
|
std::string hostname;
|
|
|
|
bool fqdn_fwd = false;
|
|
|
|
bool fqdn_rev = false;
|
2013-09-09 19:22:28 +02:00
|
|
|
OptionCustomPtr opt_hostname;
|
2013-09-09 10:24:54 +02:00
|
|
|
Option4ClientFqdnPtr fqdn = boost::dynamic_pointer_cast<
|
|
|
|
Option4ClientFqdn>(answer->getOption(DHO_FQDN));
|
|
|
|
if (fqdn) {
|
|
|
|
hostname = fqdn->getDomainName();
|
|
|
|
fqdn_fwd = fqdn->getFlag(Option4ClientFqdn::FLAG_S);
|
|
|
|
fqdn_rev = !fqdn->getFlag(Option4ClientFqdn::FLAG_N);
|
2013-09-09 14:19:12 +02:00
|
|
|
} else {
|
2013-09-09 19:22:28 +02:00
|
|
|
opt_hostname = boost::dynamic_pointer_cast<OptionCustom>
|
|
|
|
(answer->getOption(DHO_HOST_NAME));
|
2013-09-09 14:19:12 +02:00
|
|
|
if (opt_hostname) {
|
|
|
|
hostname = opt_hostname->readString();
|
|
|
|
// @todo It could be configurable what sort of updates the server
|
|
|
|
// is doing when Hostname option was sent.
|
|
|
|
fqdn_fwd = true;
|
|
|
|
fqdn_rev = true;
|
|
|
|
}
|
2013-09-09 10:24:54 +02:00
|
|
|
}
|
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
// Use allocation engine to pick a lease for this client. Allocation engine
|
|
|
|
// will try to honour the hint, but it is just a hint - some other address
|
|
|
|
// may be used instead. If fake_allocation is set to false, the lease will
|
|
|
|
// be inserted into the LeaseMgr as well.
|
2013-08-21 14:23:42 +02:00
|
|
|
// @todo pass the actual FQDN data.
|
|
|
|
Lease4Ptr old_lease;
|
2012-12-31 16:49:37 +01:00
|
|
|
Lease4Ptr lease = alloc_engine_->allocateAddress4(subnet, client_id, hwaddr,
|
2013-09-09 10:24:54 +02:00
|
|
|
hint, fqdn_fwd, fqdn_rev,
|
|
|
|
hostname,
|
2013-08-21 14:23:42 +02:00
|
|
|
fake_allocation,
|
|
|
|
callout_handle,
|
|
|
|
old_lease);
|
2012-12-31 16:49:37 +01:00
|
|
|
|
|
|
|
if (lease) {
|
2013-01-08 13:53:34 +01:00
|
|
|
// We have a lease! Let's set it in the packet and send it back to
|
|
|
|
// the client.
|
2012-12-31 16:49:37 +01:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, fake_allocation?
|
|
|
|
DHCP4_LEASE_ADVERT:DHCP4_LEASE_ALLOC)
|
2013-01-03 13:33:06 +01:00
|
|
|
.arg(lease->addr_.toText())
|
2012-12-31 16:49:37 +01:00
|
|
|
.arg(client_id?client_id->toText():"(no client-id)")
|
2013-01-03 13:33:06 +01:00
|
|
|
.arg(hwaddr?hwaddr->toText():"(no hwaddr info)");
|
2012-12-31 16:49:37 +01:00
|
|
|
|
|
|
|
answer->setYiaddr(lease->addr_);
|
|
|
|
|
2013-09-09 19:22:28 +02:00
|
|
|
// If there has been Client FQDN or Hostname option sent, but the
|
|
|
|
// hostname is empty, it means that server is responsible for
|
|
|
|
// generating the entire hostname for the client. The example of the
|
|
|
|
// client's name, generated from the IP address is: host-192-0-2-3.
|
|
|
|
if ((fqdn || opt_hostname) && lease->hostname_.empty()) {
|
|
|
|
hostname = lease->addr_.toText();
|
|
|
|
// Replace dots with hyphens.
|
|
|
|
std::replace(hostname.begin(), hostname.end(), '.', '-');
|
|
|
|
ostringstream stream;
|
|
|
|
// The partial suffix will need to be replaced with the actual
|
|
|
|
// domain-name for the client when configuration is implemented.
|
|
|
|
stream << "host-" << hostname << "." << FQDN_PARTIAL_SUFFIX << ".";
|
|
|
|
lease->hostname_ = stream.str();
|
|
|
|
// The operations below are rather safe, but we want to catch
|
|
|
|
// any potential exceptions (e.g. invalid lease database backend
|
|
|
|
// implementation) and log an error.
|
|
|
|
try {
|
|
|
|
// The lease update should be safe, because the lease should
|
|
|
|
// be already in the database. In most cases the exception
|
|
|
|
// would be thrown if the lease was missing.
|
|
|
|
LeaseMgrFactory::instance().updateLease4(lease);
|
|
|
|
// The name update in the option should be also safe,
|
|
|
|
// because the generated name is well formed.
|
|
|
|
if (fqdn) {
|
|
|
|
fqdn->setDomainName(lease->hostname_,
|
|
|
|
Option4ClientFqdn::FULL);
|
|
|
|
} else if (opt_hostname) {
|
|
|
|
opt_hostname->writeString(lease->hostname_);
|
|
|
|
}
|
|
|
|
|
|
|
|
} catch (const Exception& ex) {
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_NAME_GEN_UPDATE_FAIL)
|
|
|
|
.arg(ex.what());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
// IP Address Lease time (type 51)
|
|
|
|
opt = OptionPtr(new Option(Option::V4, DHO_DHCP_LEASE_TIME));
|
|
|
|
opt->setUint32(lease->valid_lft_);
|
|
|
|
answer->addOption(opt);
|
|
|
|
|
|
|
|
// Router (type 3)
|
2013-01-22 18:40:55 +01:00
|
|
|
Subnet::OptionDescriptor opt_routers =
|
|
|
|
subnet->getOptionDescriptor("dhcp4", DHO_ROUTERS);
|
|
|
|
if (opt_routers.option) {
|
|
|
|
answer->addOption(opt_routers.option);
|
|
|
|
}
|
2012-12-31 16:49:37 +01:00
|
|
|
|
|
|
|
// Subnet mask (type 1)
|
|
|
|
answer->addOption(getNetmaskOption(subnet));
|
|
|
|
|
|
|
|
// @todo: send renew timer option (T1, option 58)
|
|
|
|
// @todo: send rebind timer option (T2, option 59)
|
|
|
|
|
2013-09-05 15:11:26 +02:00
|
|
|
// @todo Currently the NameChangeRequests are always generated if
|
|
|
|
// real (not fake) allocation is being performed. Should we have
|
|
|
|
// control switch to enable/disable NameChangeRequest creation?
|
|
|
|
// Perhaps we need a way to detect whether the b10-dhcp-ddns module
|
|
|
|
// is up an running?
|
|
|
|
if (!fake_allocation) {
|
|
|
|
try {
|
|
|
|
createNameChangeRequests(lease, old_lease);
|
|
|
|
} catch (const Exception& ex) {
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_NCR_CREATION_FAILED)
|
|
|
|
.arg(ex.what());
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
} else {
|
|
|
|
// Allocation engine did not allocate a lease. The engine logged
|
|
|
|
// cause of that failure. The only thing left is to insert
|
|
|
|
// status code to pass the sad news to the client.
|
|
|
|
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, fake_allocation?
|
|
|
|
DHCP4_LEASE_ADVERT_FAIL:DHCP4_LEASE_ALLOC_FAIL)
|
|
|
|
.arg(client_id?client_id->toText():"(no client-id)")
|
|
|
|
.arg(hwaddr?hwaddr->toText():"(no hwaddr info)")
|
|
|
|
.arg(hint.toText());
|
|
|
|
|
2013-01-08 12:07:07 +01:00
|
|
|
answer->setType(DHCPNAK);
|
2012-12-31 16:49:37 +01:00
|
|
|
answer->setYiaddr(IOAddress("0.0.0.0"));
|
2013-09-09 10:24:54 +02:00
|
|
|
|
|
|
|
answer->delOption(DHO_FQDN);
|
|
|
|
answer->delOption(DHO_HOST_NAME);
|
2012-12-31 16:49:37 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-21 15:18:58 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::adjustRemoteAddr(const Pkt4Ptr& question, Pkt4Ptr& msg) {
|
|
|
|
// Let's create static objects representing zeroed and broadcast
|
|
|
|
// addresses. We will use them further in this function to test
|
|
|
|
// other addresses against them. Since they are static, they will
|
|
|
|
// be created only once.
|
|
|
|
static const IOAddress zero_addr("0.0.0.0");
|
|
|
|
static const IOAddress bcast_addr("255.255.255.255");
|
|
|
|
|
|
|
|
// If received relayed message, server responds to the relay address.
|
|
|
|
if (question->getGiaddr() != zero_addr) {
|
|
|
|
msg->setRemoteAddr(question->getGiaddr());
|
|
|
|
|
|
|
|
// If giaddr is 0 but client set ciaddr, server should unicast the
|
|
|
|
// response to ciaddr.
|
|
|
|
} else if (question->getCiaddr() != zero_addr) {
|
|
|
|
msg->setRemoteAddr(question->getCiaddr());
|
|
|
|
|
|
|
|
// We can't unicast the response to the client when sending NAK,
|
|
|
|
// because we haven't allocated address for him. Therefore,
|
|
|
|
// NAK is broadcast.
|
|
|
|
} else if (msg->getType() == DHCPNAK) {
|
|
|
|
msg->setRemoteAddr(bcast_addr);
|
|
|
|
|
|
|
|
// If yiaddr is set it means that we have created a lease for a client.
|
2013-05-21 21:19:28 +02:00
|
|
|
} else if (msg->getYiaddr() != zero_addr) {
|
2013-05-21 15:18:58 +02:00
|
|
|
// If the broadcast bit is set in the flags field, we have to
|
|
|
|
// send the response to broadcast address. Client may have requested it
|
|
|
|
// because it doesn't support reception of messages on the interface
|
|
|
|
// which doesn't have an address assigned. The other case when response
|
|
|
|
// must be broadcasted is when our server does not support responding
|
|
|
|
// directly to a client without address assigned.
|
2013-05-22 17:50:33 +02:00
|
|
|
const bool bcast_flag = ((question->getFlags() & Pkt4::FLAG_BROADCAST_MASK) != 0);
|
2013-05-21 15:18:58 +02:00
|
|
|
if (!IfaceMgr::instance().isDirectResponseSupported() || bcast_flag) {
|
|
|
|
msg->setRemoteAddr(bcast_addr);
|
|
|
|
|
|
|
|
// Client cleared the broadcast bit and we support direct responses
|
|
|
|
// so we should unicast the response to a newly allocated address -
|
|
|
|
// yiaddr.
|
|
|
|
} else {
|
2013-05-21 21:19:28 +02:00
|
|
|
msg->setRemoteAddr(msg->getYiaddr());
|
2013-05-21 15:18:58 +02:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// In most cases, we should have the remote address found already. If we
|
|
|
|
// found ourselves at this point, the rational thing to do is to respond
|
|
|
|
// to the address we got the query from.
|
|
|
|
} else {
|
|
|
|
msg->setRemoteAddr(question->getRemoteAddr());
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
OptionPtr
|
|
|
|
Dhcpv4Srv::getNetmaskOption(const Subnet4Ptr& subnet) {
|
2012-12-31 16:49:37 +01:00
|
|
|
uint32_t netmask = getNetmask4(subnet->get().second);
|
|
|
|
|
|
|
|
OptionPtr opt(new OptionInt<uint32_t>(Option::V4,
|
|
|
|
DHO_SUBNET_MASK, netmask));
|
|
|
|
|
|
|
|
return (opt);
|
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
Pkt4Ptr
|
|
|
|
Dhcpv4Srv::processDiscover(Pkt4Ptr& discover) {
|
2013-07-16 13:58:01 +02:00
|
|
|
|
|
|
|
sanityCheck(discover, FORBIDDEN);
|
|
|
|
|
2012-02-03 16:54:41 +01:00
|
|
|
Pkt4Ptr offer = Pkt4Ptr
|
2011-12-23 17:26:24 +01:00
|
|
|
(new Pkt4(DHCPOFFER, discover->getTransid()));
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2011-12-23 17:26:24 +01:00
|
|
|
copyDefaultFields(discover, offer);
|
|
|
|
appendDefaultOptions(offer, DHCPOFFER);
|
2013-01-15 19:53:58 +01:00
|
|
|
appendRequestedOptions(discover, offer);
|
2011-12-23 17:26:24 +01:00
|
|
|
|
2013-09-09 10:24:54 +02:00
|
|
|
// If DISCOVER message contains the FQDN or Hostname option, server
|
|
|
|
// may respond to the client with the appropriate FQDN or Hostname
|
|
|
|
// option to indicate that whether it will take responsibility for
|
|
|
|
// updating DNS when the client sends REQUEST message.
|
|
|
|
processClientName(discover, offer);
|
|
|
|
|
2012-12-31 16:49:37 +01:00
|
|
|
assignLease(discover, offer);
|
2011-12-20 19:59:14 +01:00
|
|
|
|
2013-01-22 18:40:55 +01:00
|
|
|
// There are a few basic options that we always want to
|
|
|
|
// include in the response. If client did not request
|
|
|
|
// them we append them for him.
|
|
|
|
appendBasicOptions(discover, offer);
|
|
|
|
|
2011-12-20 19:59:14 +01:00
|
|
|
return (offer);
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
Pkt4Ptr
|
|
|
|
Dhcpv4Srv::processRequest(Pkt4Ptr& request) {
|
2013-08-20 15:18:27 +02:00
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
/// @todo Uncomment this (see ticket #3116)
|
2013-08-20 15:18:27 +02:00
|
|
|
// sanityCheck(request, MANDATORY);
|
|
|
|
|
2012-02-03 16:54:41 +01:00
|
|
|
Pkt4Ptr ack = Pkt4Ptr
|
2011-12-21 16:37:11 +01:00
|
|
|
(new Pkt4(DHCPACK, request->getTransid()));
|
|
|
|
|
|
|
|
copyDefaultFields(request, ack);
|
|
|
|
appendDefaultOptions(ack, DHCPACK);
|
2013-01-15 19:53:58 +01:00
|
|
|
appendRequestedOptions(request, ack);
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-09-09 10:24:54 +02:00
|
|
|
// If REQUEST message contains the FQDN or Hostname option, server
|
|
|
|
// should respond to the client with the appropriate FQDN or Hostname
|
|
|
|
// option to indicate if it takes responsibility for the DNS updates.
|
|
|
|
// This is performed by the function below.
|
|
|
|
processClientName(request, ack);
|
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Note that we treat REQUEST message uniformly, regardless if this is a
|
|
|
|
// first request (requesting for new address), renewing existing address
|
|
|
|
// or even rebinding.
|
2012-12-31 16:49:37 +01:00
|
|
|
assignLease(request, ack);
|
2011-12-21 16:37:11 +01:00
|
|
|
|
2013-01-22 18:40:55 +01:00
|
|
|
// There are a few basic options that we always want to
|
|
|
|
// include in the response. If client did not request
|
|
|
|
// them we append them for him.
|
|
|
|
appendBasicOptions(request, ack);
|
|
|
|
|
2011-12-21 16:37:11 +01:00
|
|
|
return (ack);
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::processRelease(Pkt4Ptr& release) {
|
2013-01-08 13:53:34 +01:00
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
/// @todo Uncomment this (see ticket #3116)
|
2013-08-20 15:18:27 +02:00
|
|
|
// sanityCheck(release, MANDATORY);
|
|
|
|
|
2013-01-08 13:53:34 +01:00
|
|
|
// Try to find client-id
|
2012-12-31 16:49:37 +01:00
|
|
|
ClientIdPtr client_id;
|
|
|
|
OptionPtr opt = release->getOption(DHO_DHCP_CLIENT_IDENTIFIER);
|
|
|
|
if (opt) {
|
|
|
|
client_id = ClientIdPtr(new ClientId(opt->getData()));
|
|
|
|
}
|
|
|
|
|
2013-01-08 13:53:34 +01:00
|
|
|
try {
|
|
|
|
// Do we have a lease for that particular address?
|
2013-09-09 10:24:54 +02:00
|
|
|
Lease4Ptr lease = LeaseMgrFactory::instance().getLease4(release->getCiaddr());
|
2013-01-08 13:53:34 +01:00
|
|
|
|
|
|
|
if (!lease) {
|
|
|
|
// No such lease - bogus release
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, DHCP4_RELEASE_FAIL_NO_LEASE)
|
2013-09-09 10:24:54 +02:00
|
|
|
.arg(release->getCiaddr().toText())
|
2013-01-08 13:53:34 +01:00
|
|
|
.arg(release->getHWAddr()->toText())
|
|
|
|
.arg(client_id ? client_id->toText() : "(no client-id)");
|
|
|
|
return;
|
|
|
|
}
|
2012-12-31 16:49:37 +01:00
|
|
|
|
2013-01-08 13:53:34 +01:00
|
|
|
// Does the hardware address match? We don't want one client releasing
|
|
|
|
// second client's leases.
|
|
|
|
if (lease->hwaddr_ != release->getHWAddr()->hwaddr_) {
|
|
|
|
// @todo: Print hwaddr from lease as part of ticket #2589
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, DHCP4_RELEASE_FAIL_WRONG_HWADDR)
|
2013-09-09 10:24:54 +02:00
|
|
|
.arg(release->getCiaddr().toText())
|
2013-01-08 13:53:34 +01:00
|
|
|
.arg(client_id ? client_id->toText() : "(no client-id)")
|
|
|
|
.arg(release->getHWAddr()->toText());
|
|
|
|
return;
|
|
|
|
}
|
2012-12-31 16:49:37 +01:00
|
|
|
|
2013-01-08 13:53:34 +01:00
|
|
|
// Does the lease have client-id info? If it has, then check it with what
|
|
|
|
// the client sent us.
|
|
|
|
if (lease->client_id_ && client_id && *lease->client_id_ != *client_id) {
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, DHCP4_RELEASE_FAIL_WRONG_CLIENT_ID)
|
2013-09-09 10:24:54 +02:00
|
|
|
.arg(release->getCiaddr().toText())
|
2013-01-08 13:53:34 +01:00
|
|
|
.arg(client_id->toText())
|
|
|
|
.arg(lease->client_id_->toText());
|
|
|
|
return;
|
|
|
|
}
|
2012-12-31 16:49:37 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
bool skip = false;
|
2013-01-08 13:53:34 +01:00
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
// Execute all callouts registered for lease4_release
|
|
|
|
if (HooksManager::getHooksManager()
|
|
|
|
.calloutsPresent(Hooks.hook_index_lease4_release_)) {
|
2013-08-19 15:08:08 +02:00
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(release);
|
|
|
|
|
|
|
|
// Delete all previous arguments
|
|
|
|
callout_handle->deleteAllArguments();
|
2013-01-08 13:53:34 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Pass the original packet
|
|
|
|
callout_handle->setArgument("query4", release);
|
|
|
|
|
|
|
|
// Pass the lease to be updated
|
|
|
|
callout_handle->setArgument("lease4", lease);
|
|
|
|
|
|
|
|
// Call all installed callouts
|
2013-08-23 11:26:36 +02:00
|
|
|
HooksManager::callCallouts(Hooks.hook_index_lease4_release_,
|
|
|
|
*callout_handle);
|
2013-08-19 15:08:08 +02:00
|
|
|
|
|
|
|
// Callouts decided to skip the next processing step. The next
|
|
|
|
// processing step would to send the packet, so skip at this
|
|
|
|
// stage means "drop response".
|
|
|
|
if (callout_handle->getSkip()) {
|
|
|
|
skip = true;
|
2013-08-23 11:26:36 +02:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_HOOKS,
|
|
|
|
DHCP4_HOOK_LEASE4_RELEASE_SKIP);
|
2013-08-19 15:08:08 +02:00
|
|
|
}
|
|
|
|
}
|
2013-01-08 13:53:34 +01:00
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
// Ok, hw and client-id match - let's release the lease.
|
|
|
|
if (!skip) {
|
2013-08-26 15:21:37 +02:00
|
|
|
bool success = LeaseMgrFactory::instance().deleteLease(lease->addr_);
|
2013-08-19 15:08:08 +02:00
|
|
|
|
|
|
|
if (success) {
|
2013-09-09 10:24:54 +02:00
|
|
|
// Release successful
|
2013-08-19 15:08:08 +02:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_DETAIL, DHCP4_RELEASE)
|
|
|
|
.arg(lease->addr_.toText())
|
|
|
|
.arg(client_id ? client_id->toText() : "(no client-id)")
|
|
|
|
.arg(release->getHWAddr()->toText());
|
2013-09-09 10:24:54 +02:00
|
|
|
|
|
|
|
// Remove existing DNS entries for the lease, if any.
|
|
|
|
queueNameChangeRequest(isc::dhcp_ddns::CHG_REMOVE, lease);
|
|
|
|
|
2013-08-19 15:08:08 +02:00
|
|
|
} else {
|
|
|
|
// Release failed -
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_RELEASE_FAIL)
|
|
|
|
.arg(lease->addr_.toText())
|
2013-01-08 13:53:34 +01:00
|
|
|
.arg(client_id ? client_id->toText() : "(no client-id)")
|
2013-08-19 15:08:08 +02:00
|
|
|
.arg(release->getHWAddr()->toText());
|
|
|
|
}
|
2013-01-08 13:53:34 +01:00
|
|
|
}
|
|
|
|
} catch (const isc::Exception& ex) {
|
|
|
|
// Rethrow the exception with a bit more data.
|
|
|
|
LOG_ERROR(dhcp4_logger, DHCP4_RELEASE_EXCEPTION)
|
|
|
|
.arg(ex.what())
|
|
|
|
.arg(release->getYiaddr());
|
2012-12-31 16:49:37 +01:00
|
|
|
}
|
|
|
|
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
2011-11-30 19:00:57 +01:00
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
2013-01-31 16:03:37 +00:00
|
|
|
Dhcpv4Srv::processDecline(Pkt4Ptr& /* decline */) {
|
2013-08-23 11:26:36 +02:00
|
|
|
/// @todo Implement this (also see ticket #3116)
|
2011-11-27 19:35:47 +08:00
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
Pkt4Ptr
|
|
|
|
Dhcpv4Srv::processInform(Pkt4Ptr& inform) {
|
2013-08-20 15:18:27 +02:00
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
/// @todo Implement this for real. (also see ticket #3116)
|
2011-11-27 19:35:47 +08:00
|
|
|
return (inform);
|
|
|
|
}
|
2012-09-06 12:58:17 +01:00
|
|
|
|
|
|
|
const char*
|
|
|
|
Dhcpv4Srv::serverReceivedPacketName(uint8_t type) {
|
|
|
|
static const char* DISCOVER = "DISCOVER";
|
|
|
|
static const char* REQUEST = "REQUEST";
|
|
|
|
static const char* RELEASE = "RELEASE";
|
|
|
|
static const char* DECLINE = "DECLINE";
|
|
|
|
static const char* INFORM = "INFORM";
|
|
|
|
static const char* UNKNOWN = "UNKNOWN";
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case DHCPDISCOVER:
|
|
|
|
return (DISCOVER);
|
|
|
|
|
|
|
|
case DHCPREQUEST:
|
|
|
|
return (REQUEST);
|
|
|
|
|
|
|
|
case DHCPRELEASE:
|
|
|
|
return (RELEASE);
|
|
|
|
|
|
|
|
case DHCPDECLINE:
|
|
|
|
return (DECLINE);
|
|
|
|
|
|
|
|
case DHCPINFORM:
|
|
|
|
return (INFORM);
|
|
|
|
|
|
|
|
default:
|
|
|
|
;
|
|
|
|
}
|
|
|
|
return (UNKNOWN);
|
|
|
|
}
|
2012-12-31 16:49:37 +01:00
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
Subnet4Ptr
|
|
|
|
Dhcpv4Srv::selectSubnet(const Pkt4Ptr& question) {
|
2012-12-31 16:49:37 +01:00
|
|
|
|
2013-07-15 18:41:19 +02:00
|
|
|
Subnet4Ptr subnet;
|
2013-01-08 12:07:07 +01:00
|
|
|
// Is this relayed message?
|
|
|
|
IOAddress relay = question->getGiaddr();
|
2013-07-19 15:54:02 +02:00
|
|
|
static const IOAddress notset("0.0.0.0");
|
2013-01-08 12:07:07 +01:00
|
|
|
|
2013-07-19 15:54:02 +02:00
|
|
|
if (relay != notset) {
|
2013-01-08 12:07:07 +01:00
|
|
|
// Yes: Use relay address to select subnet
|
2013-07-15 18:41:19 +02:00
|
|
|
subnet = CfgMgr::instance().getSubnet4(relay);
|
2013-01-08 12:07:07 +01:00
|
|
|
} else {
|
|
|
|
|
|
|
|
// No: Use client's address to select subnet
|
2013-07-15 18:41:19 +02:00
|
|
|
subnet = CfgMgr::instance().getSubnet4(question->getRemoteAddr());
|
2013-01-08 12:07:07 +01:00
|
|
|
}
|
2013-07-15 18:41:19 +02:00
|
|
|
|
2013-07-16 15:12:52 +02:00
|
|
|
/// @todo Implement getSubnet4(interface-name)
|
|
|
|
|
2013-08-23 11:26:36 +02:00
|
|
|
// Let's execute all callouts registered for subnet4_select
|
2013-07-19 15:54:02 +02:00
|
|
|
if (HooksManager::calloutsPresent(hook_index_subnet4_select_)) {
|
2013-07-15 18:41:19 +02:00
|
|
|
CalloutHandlePtr callout_handle = getCalloutHandle(question);
|
|
|
|
|
|
|
|
// We're reusing callout_handle from previous calls
|
|
|
|
callout_handle->deleteAllArguments();
|
|
|
|
|
|
|
|
// Set new arguments
|
|
|
|
callout_handle->setArgument("query4", question);
|
|
|
|
callout_handle->setArgument("subnet4", subnet);
|
2013-08-23 11:26:36 +02:00
|
|
|
callout_handle->setArgument("subnet4collection",
|
|
|
|
CfgMgr::instance().getSubnets4());
|
2013-07-15 18:41:19 +02:00
|
|
|
|
|
|
|
// Call user (and server-side) callouts
|
2013-08-23 11:26:36 +02:00
|
|
|
HooksManager::callCallouts(hook_index_subnet4_select_,
|
|
|
|
*callout_handle);
|
2013-07-15 18:41:19 +02:00
|
|
|
|
|
|
|
// Callouts decided to skip this step. This means that no subnet will be
|
2013-08-23 11:26:36 +02:00
|
|
|
// selected. Packet processing will continue, but it will be severly
|
|
|
|
// limited (i.e. only global options will be assigned)
|
2013-07-15 18:41:19 +02:00
|
|
|
if (callout_handle->getSkip()) {
|
2013-08-23 11:26:36 +02:00
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_HOOKS,
|
|
|
|
DHCP4_HOOK_SUBNET4_SELECT_SKIP);
|
2013-07-15 18:41:19 +02:00
|
|
|
return (Subnet4Ptr());
|
|
|
|
}
|
|
|
|
|
|
|
|
// Use whatever subnet was specified by the callout
|
|
|
|
callout_handle->getArgument("subnet4", subnet);
|
2013-01-08 12:07:07 +01:00
|
|
|
}
|
2013-07-15 18:41:19 +02:00
|
|
|
|
|
|
|
return (subnet);
|
2012-12-31 16:49:37 +01:00
|
|
|
}
|
|
|
|
|
2013-01-30 19:07:54 +01:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::sanityCheck(const Pkt4Ptr& pkt, RequirementLevel serverid) {
|
2012-12-31 16:49:37 +01:00
|
|
|
OptionPtr server_id = pkt->getOption(DHO_DHCP_SERVER_IDENTIFIER);
|
|
|
|
switch (serverid) {
|
|
|
|
case FORBIDDEN:
|
|
|
|
if (server_id) {
|
|
|
|
isc_throw(RFCViolation, "Server-id option was not expected, but "
|
|
|
|
<< "received in " << serverReceivedPacketName(pkt->getType()));
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MANDATORY:
|
|
|
|
if (!server_id) {
|
|
|
|
isc_throw(RFCViolation, "Server-id option was expected, but not "
|
|
|
|
" received in message "
|
|
|
|
<< serverReceivedPacketName(pkt->getType()));
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case OPTIONAL:
|
|
|
|
// do nothing here
|
|
|
|
;
|
|
|
|
}
|
2013-07-16 13:58:01 +02:00
|
|
|
|
|
|
|
// If there is HWAddress set and it is non-empty, then we're good
|
2013-07-19 15:54:02 +02:00
|
|
|
if (pkt->getHWAddr() && !pkt->getHWAddr()->hwaddr_.empty()) {
|
2013-07-16 13:58:01 +02:00
|
|
|
return;
|
2013-07-19 15:54:02 +02:00
|
|
|
}
|
2013-07-16 13:58:01 +02:00
|
|
|
|
|
|
|
// There has to be something to uniquely identify the client:
|
|
|
|
// either non-zero MAC address or client-id option present (or both)
|
|
|
|
OptionPtr client_id = pkt->getOption(DHO_DHCP_CLIENT_IDENTIFIER);
|
|
|
|
|
|
|
|
// If there's no client-id (or a useless one is provided, i.e. 0 length)
|
|
|
|
if (!client_id || client_id->len() == client_id->getHeaderLen()) {
|
|
|
|
isc_throw(RFCViolation, "Missing or useless client-id and no HW address "
|
|
|
|
" provided in message "
|
|
|
|
<< serverReceivedPacketName(pkt->getType()));
|
|
|
|
}
|
2012-12-31 16:49:37 +01:00
|
|
|
}
|
2013-01-31 12:16:22 +00:00
|
|
|
|
2013-07-19 12:45:00 +02:00
|
|
|
void
|
|
|
|
Dhcpv4Srv::openActiveSockets(const uint16_t port,
|
|
|
|
const bool use_bcast) {
|
|
|
|
IfaceMgr::instance().closeSockets();
|
|
|
|
|
|
|
|
// Get the reference to the collection of interfaces. This reference should
|
|
|
|
// be valid as long as the program is run because IfaceMgr is a singleton.
|
|
|
|
// Therefore we can safely iterate over instances of all interfaces and
|
|
|
|
// modify their flags. Here we modify flags which indicate whether socket
|
|
|
|
// should be open for a particular interface or not.
|
|
|
|
const IfaceMgr::IfaceCollection& ifaces = IfaceMgr::instance().getIfaces();
|
|
|
|
for (IfaceMgr::IfaceCollection::const_iterator iface = ifaces.begin();
|
|
|
|
iface != ifaces.end(); ++iface) {
|
|
|
|
Iface* iface_ptr = IfaceMgr::instance().getIface(iface->getName());
|
2013-07-19 16:35:36 +02:00
|
|
|
if (iface_ptr == NULL) {
|
|
|
|
isc_throw(isc::Unexpected, "Interface Manager returned NULL"
|
|
|
|
<< " instance of the interface when DHCPv4 server was"
|
|
|
|
<< " trying to reopen sockets after reconfiguration");
|
|
|
|
}
|
2013-07-19 12:45:00 +02:00
|
|
|
if (CfgMgr::instance().isActiveIface(iface->getName())) {
|
|
|
|
iface_ptr->inactive4_ = false;
|
|
|
|
LOG_INFO(dhcp4_logger, DHCP4_ACTIVATE_INTERFACE)
|
|
|
|
.arg(iface->getFullName());
|
|
|
|
|
|
|
|
} else {
|
|
|
|
// For deactivating interface, it should be sufficient to log it
|
|
|
|
// on the debug level because it is more useful to know what
|
|
|
|
// interface is activated which is logged on the info level.
|
|
|
|
LOG_DEBUG(dhcp4_logger, DBG_DHCP4_BASIC,
|
|
|
|
DHCP4_DEACTIVATE_INTERFACE).arg(iface->getName());
|
|
|
|
iface_ptr->inactive4_ = true;
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Let's reopen active sockets. openSockets4 will check internally whether
|
|
|
|
// sockets are marked active or inactive.
|
2013-07-19 13:14:02 +02:00
|
|
|
// @todo Optimization: we should not reopen all sockets but rather select
|
|
|
|
// those that have been affected by the new configuration.
|
2013-07-19 12:45:00 +02:00
|
|
|
if (!IfaceMgr::instance().openSockets4(port, use_bcast)) {
|
|
|
|
LOG_WARN(dhcp4_logger, DHCP4_NO_SOCKETS_OPEN);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-01-31 12:16:22 +00:00
|
|
|
} // namespace dhcp
|
|
|
|
} // namespace isc
|